XQuery uses the concept of a namespace, adopted from the XML 1.0 specification. But, due to the complex nature of the XQuery language and it's dual roles as both query and serialization/XML construction language, there are several nuances to the use of...

Just blogging this for my own archives to read again in the future.
[Via Fabulous Adventures In Coding ]
A few months ago an old friend had to give her first talk at a conference. Now, she used to do community theatre back when we were in school...

Last week, I represented my group withiin Microsoft (Microsoft.com Community & Collaborative Development) along with my colleague, Betsy Aoki at the annual Microsoft TechEd Conference for software developers and IT Pros in Amsterdam, Netherlands....

On Friday I talked a bit about how teams work together to create SDK collections. Today I'm going to drill in more detail into the process of creating HxSs, the base files used for documentation in the Libraries. The same disclaimer applies as on Friday...

posted by Emily Yaich
Hello everyone! I am Emily Yaich and I am another one of the Microsoft Explorers working on the visual basic team. I have been here since the second week in June, and I am loving every minute of it! We haven't gotten into the...

From my friends at MDCFUG:
You are invited to the Maryland ColdFusion User Group Meeting on Tuesday 07/12/2005. If you don't like the topics, come for the pizza! Just kidding!
6:30pm 'CFUNITED report' by Simon Horwith
8:00pm 'Using Webservices...

More about SharePoint and Lotus integration/migration (repost from http://jopx.blogspot.com/2005/06/more-about-sharepoint-and-lotus.html )
Michael Greth posted an item about SharePoint und Lotus Notes , here are some other usefull links for those of...

A few months ago an old friend had to give her first talk at a conference. Now, she used to do community theatre back when we were in school together, so she’s no stranger to standing up in front of a bunch of people and acting goofy. However there are...

The EncryptByKey built-in function takes an optional "authenticator" argument. What is an authenticator?
The authenticator helps you deter whole-value substitution of encrypted fields. For example, consider the following table of payroll data.
Employee_ID...